Network Security Monitoring Cluster Masaryk University Ing. Jiří Sedláček NSMC CEO jiri.sedlacek@nsmcluster.com Cybersecurity education at secondary schools in the Czech Republic Who is NSMC? MU VUT T-SOFT Sova Net AGORA Unis Computers Flowmon Networks Novicom AXENTACOOP MKT TECH AXENTA ELAT SODAT SW MU AVERIA 2010 NSMC CYBER SECURITY SERVICES • ANALYSIS • FEASIBILITY STUDIES • RISK ANALYSIS • IMPLEMENTATION POLICIES AND PRINCIPLES BASED ON ISO 27k • ORGANIZATIONAL AND TECHNICAL MEASURES • PENETRATION TESTING IMPLEMENTATION • CYBERSECURITY EDUCATIONS PROGRAMS FOR IT AND OTHERS • SPECIAL COURSE FOR SECONDARY SCHOOLS (HEADMASTERS AND TEACHERS) • CYBERSECURITY EDUCATION PROGRAM FOR SECONDARY SCHOOLS (PILOT PROJECT) EDUCATION • FOR COMPANIES AND GOVERNMENT INSTITUTIONS ADVISORY SERVICES RHK Brno www.rhkbrno.cz NSMC and it‘s role TPKB www.tp-kb.cz I4.0 cluster www.ic40.cz NSMC www.nsmcluster.com MU CIH www.cybersecuritydih.cz NC3 www.nc3.cz C4e www.c4e.cz Why cybersecurity education? Cyberspace Legislation, standards Clear communication and a common understanding of cybersecurity defini- tions HUMAN FIREWALL JCE in ČR Praha 09/2017 Dvůr Králové nad Labem 09/2018 Brno 09/2017 JCE are the way for establish cyber security education at secondary schools in ČR What can JCE provide in its region? Methodics for implementation cybersecurity in secondary schools Education and evangelization in cyber security for pupils and public Cyber laboratory Conferences and videoconferences Cyber security competitions and exercises JCE Čichnova - standard • Kick off of cooperation NSMC - SŠ IPF Čichnova 2015 • Negotiation with MŠMT about cybersecurity education program 2015 - 2017 • Feasibility study preparation 2016 • Project documentation preparation 2017 - 2018 • JCE Čichnova realization 2019 zero phase first phase second phase third phase What each JCE needs? National cybersecurity authority support Educated teachers and management Modernized ICT and built cybersecurity laboratory Finance from region/government Cooperating academia Cooperating clusters 1 2 3 4 6 5 L2 monitoring Flow monitoring Infrastructure monitoring Antivir Antimalware Protectionofclients Privileged users monitoring Security at the perimeter Clients Mobile clients Desktops Network IS DDI IPAM DHCP, DNS, Radius NAC 802.1x, MAC auth NBA, APM, ADS Firewall CYBERSECURITY CONCEPT IN Čichnova school Log Management JMK L2 monitoring Flow monitoring Infrastructure monitoring Antivir Antimalware Protectionofclients Privileged users monitoring Security at the perimeter Clients Mobile clients Desktops Network IS Servers DDI IPAM DHCP, DNS, Radius NAC 802.1x, MAC auth NBA, APM, ADS Firewall CYBERSECURITY CONCEPT IN Čichnova LAB Log Management SIEM Thank you for your attention Network Security Monitoring Cluster info@nsmcluster.com www.nsmcluster.com